The rapid growth of the Internet of Things(IoT)operations has necessitated the incorporation of quantum computing technologies tomeet its expanding needs.This integration ismotivated by the need to solve the specific ...The rapid growth of the Internet of Things(IoT)operations has necessitated the incorporation of quantum computing technologies tomeet its expanding needs.This integration ismotivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario.The combination of IoT and quantum computing creates new privacy and security problems.This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications.We investigate the incorporation of quantum computing approaches within IoT security frameworks,with a focus on developing effective security mechanisms.Our research,which uses quantum algorithms and cryptographic protocols,provides a unique solution to protecting sensitive information and assuring the integrity of IoT systems.We rigorously analyze critical quantum computing security properties,building a hierarchical framework for systematic examination.We offer concrete solutions flexible to diverse aswell as ambiguous opinions through using a unified computational model with analytical hierarchy process(AHP)multi-criteria decision-making(MCDM)as the technique for ordering preferences by similarity to ideal solutions(TOPSIS)in a fuzzy environment.This study adds practical benefit by supporting practitioners in recognizing,choosing,and prioritizing essential security factors from the standpoint of quantum computing.Our approach is a critical step towards improving quantum-level security in IoT systems,strengthening their resilience against future threats,and preserving the IoT ecosystem’s long-term prosperity.展开更多
Food security is a strategic priority for a country’s economic development.In China,high-standard farmland construction(HSFC)is an important initiative to stabilize grain production and increase grain production capa...Food security is a strategic priority for a country’s economic development.In China,high-standard farmland construction(HSFC)is an important initiative to stabilize grain production and increase grain production capacity.Based on panel data from 31 sample provinces,autonomous regions,and municipalities in China from 2005–2017,this study explored the impact of HSFC on grain yield using the difference-in-differences(DID)method.The results showed that HSFC significantly increased total grain production,which is robust to various checks.HSFC increased grain yield through three potential mechanisms.First,it could increase the grain replanting index.Second,it could effectively reduce yield loss due to droughts and floods.Last,HSFC could strengthen the cultivated land by renovating the low-and medium-yielding fields.Heterogeneity analysis found that the HSFC farmland showed a significant increase in grain yield only in the main grain-producing areas and balanced areas.In addition,HSFC significantly increased the yields of rice,wheat,and maize while leading to a reduction in soybean yields.The findings suggest the government should continue to promote HSFC,improve construction standards,and strictly control the“non-agriculturalization”and“non-coordination”of farmland to increase grain production further.At the same time,market mechanisms should be used to incentivize soybean farming,improve returns and stabilize soybean yields.展开更多
Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost imp...Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost importance.Properties must be considered to minimise the security risk.Additionally,security risk management activities are revised,prepared,implemented,tracked,and regularly set up efficiently to design the security of healthcare web applications.Managing the security risk of a healthcare web application must be considered as the key component.Security is,in specific,seen as an add-on during the development process of healthcare web applications,but not as the key problem.Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application.In this row,the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability.This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own,and not depend solely on the external security of healthcare web applications.Furthermore,in terms of healthcare web application’s security-durability,the security risk variable is measured,and vice versa.Hence,the findings of our study will also be useful in improving the durability of several web applications in healthcare.展开更多
This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contr...This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction.展开更多
The construction of network ideological security is an extremely important work concerning the life and death of the ruling party and the long-term stability of the country.In the new era,the construction of network i...The construction of network ideological security is an extremely important work concerning the life and death of the ruling party and the long-term stability of the country.In the new era,the construction of network ideological security should take"the fifth space"as the position,follow the principle of network ideological security construction,correct the wrong understanding from the root to determine the network consciousness.The content of ideological security construction,and then achieve the victory of ideolog?ical struggle on the network.展开更多
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform...Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.展开更多
As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could h...As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could have devastating effects on the operations and reputation of these companies. Preventing such cyberattacks is crucial. Especially, with the significance of the Egyptian oil and gas downstream sector to the local economy and the fact that many of these connected systems are sometimes managed remotely. This paper examines the value of the ISO 27001 standard in mitigating the effect of cyber threat and seeks to inspire decision-makers to the importance of the proactive measures to strengthen their organization’s cybersecurity posture and protect information critical assets. The study stresses the importance of improving the local educational system to bridge the gap between supply and demand for cybersecurity specialists by implementing a structured approach that emphasizes behavior modification to get a high return on investment in cybersecurity awareness.展开更多
In the Report of the 19 th National Congress of the Communist Party of China,it stated that we must put the ecological safety and green development in the first place.To achieve rural revitalization,ecological livabil...In the Report of the 19 th National Congress of the Communist Party of China,it stated that we must put the ecological safety and green development in the first place.To achieve rural revitalization,ecological livability is the most important factor.Taking Luquan Yi and Miao Autonomous County(national level poor county)in Jinsha River valley of Yunnan Province as an example,using DPSIR(drivers,pressures,states,impacts,responses)model,this paper established an evaluation indicator system.Besides,using the entropy method,it determined the indicator weight.In addition,it evaluated the land ecological security of Luquan County since the implementation of targeted poverty alleviation policy(2013-2017)using multi-factor comprehensive evaluation method.This study shows that Luquan County has improved its ecological security in the past five years.The ecological status has gone through four stages,from sensitive state to severe state to critical safety to excellent ecology,and the value of the comprehensive index of land ecological security shows a rising trend.Through analyzing the ecological security value of each criterion hierarchy,it obtained the main factors affecting the ecological security of Luquan County.On this basis,it came up with feasible measures and recommendations for studying the ecological security of land in the region,so as to guide the rational use of land and sustainable economic development,provide a reference for the implementation of rural revitalization strategies,and promote the construction of regional ecological civilization.展开更多
As the pioneer in the intelligent construction technologies(ICT)of transportation infrastructure,intelligent compaction(IC)has been applied in the infrastructure construction of various countries.It is currently the t...As the pioneer in the intelligent construction technologies(ICT)of transportation infrastructure,intelligent compaction(IC)has been applied in the infrastructure construction of various countries.It is currently the technology that best reflects the intelligence of engineering construction.This article overviews the latest developments and trends in IC.Firstly,the basic meaning of ICT is defined based on the essential characteristics of intelligent construction of transportation infrastructure,“perception,analysis,decision-making,execution”(PADE).The concept of intelligent compaction technology classification is also introduced.The PADE requirements that intelligent compaction should meet are proposed.Secondly,according to the sequence of“perception,analysis,decision-making,execution,”the workflow and key technologies of intelligent compaction are analyzed,and the mechanism of using the response of the roller to solve the modulus is given and verified.On this basis,The IC feasibility test methods,including compaction degree,compaction stability,and compaction uniformity,are briefly described.The implementation scheme of feedback control is given.Then,the use of artificial neural networks(ANN),hybrid expert systems,and reinforcement learning in intelligent compaction are briefly introduced.Finally,several extended applications of intelligent compaction are expounded,including the development ideas of intelligent road rollers and the role of intelligent compaction in virtual construction,the layer-specific mechanical parameters of fillers,etc.展开更多
In order to stabilize the operation of innovation and entrepreneurship education and improve the graduate employment ability of sports training professionals,this paper,based on the literature,work experience and actu...In order to stabilize the operation of innovation and entrepreneurship education and improve the graduate employment ability of sports training professionals,this paper,based on the literature,work experience and actual environment background,promotes the development and employment of sports training professionals in sports colleges and universities.展开更多
文摘The rapid growth of the Internet of Things(IoT)operations has necessitated the incorporation of quantum computing technologies tomeet its expanding needs.This integration ismotivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario.The combination of IoT and quantum computing creates new privacy and security problems.This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications.We investigate the incorporation of quantum computing approaches within IoT security frameworks,with a focus on developing effective security mechanisms.Our research,which uses quantum algorithms and cryptographic protocols,provides a unique solution to protecting sensitive information and assuring the integrity of IoT systems.We rigorously analyze critical quantum computing security properties,building a hierarchical framework for systematic examination.We offer concrete solutions flexible to diverse aswell as ambiguous opinions through using a unified computational model with analytical hierarchy process(AHP)multi-criteria decision-making(MCDM)as the technique for ordering preferences by similarity to ideal solutions(TOPSIS)in a fuzzy environment.This study adds practical benefit by supporting practitioners in recognizing,choosing,and prioritizing essential security factors from the standpoint of quantum computing.Our approach is a critical step towards improving quantum-level security in IoT systems,strengthening their resilience against future threats,and preserving the IoT ecosystem’s long-term prosperity.
基金supported by the National Natural Science Foundation of China(41871184)the National Social Science Fund of China(21ZDA056)the Scientific and Technological Innovation Project of the Chinese Academy of Agricultural Sciences(10-IAED-ZT-01-2023and 10-IAED-RC-07-2023)。
文摘Food security is a strategic priority for a country’s economic development.In China,high-standard farmland construction(HSFC)is an important initiative to stabilize grain production and increase grain production capacity.Based on panel data from 31 sample provinces,autonomous regions,and municipalities in China from 2005–2017,this study explored the impact of HSFC on grain yield using the difference-in-differences(DID)method.The results showed that HSFC significantly increased total grain production,which is robust to various checks.HSFC increased grain yield through three potential mechanisms.First,it could increase the grain replanting index.Second,it could effectively reduce yield loss due to droughts and floods.Last,HSFC could strengthen the cultivated land by renovating the low-and medium-yielding fields.Heterogeneity analysis found that the HSFC farmland showed a significant increase in grain yield only in the main grain-producing areas and balanced areas.In addition,HSFC significantly increased the yields of rice,wheat,and maize while leading to a reduction in soybean yields.The findings suggest the government should continue to promote HSFC,improve construction standards,and strictly control the“non-agriculturalization”and“non-coordination”of farmland to increase grain production further.At the same time,market mechanisms should be used to incentivize soybean farming,improve returns and stabilize soybean yields.
基金Funding for this study was received from the Ministry of Education and Deanship of Scientific Research at King Abdulaziz University,Kingdom of Saudi Arabia under Grant No.IFPHI-286-611-2020.
文摘Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost importance.Properties must be considered to minimise the security risk.Additionally,security risk management activities are revised,prepared,implemented,tracked,and regularly set up efficiently to design the security of healthcare web applications.Managing the security risk of a healthcare web application must be considered as the key component.Security is,in specific,seen as an add-on during the development process of healthcare web applications,but not as the key problem.Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application.In this row,the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability.This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own,and not depend solely on the external security of healthcare web applications.Furthermore,in terms of healthcare web application’s security-durability,the security risk variable is measured,and vice versa.Hence,the findings of our study will also be useful in improving the durability of several web applications in healthcare.
基金Supported by the Ministry of Housing and Urban-Rural Development Science and Technology Project Program of China(2016-K8-045)
文摘This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction.
文摘The construction of network ideological security is an extremely important work concerning the life and death of the ruling party and the long-term stability of the country.In the new era,the construction of network ideological security should take"the fifth space"as the position,follow the principle of network ideological security construction,correct the wrong understanding from the root to determine the network consciousness.The content of ideological security construction,and then achieve the victory of ideolog?ical struggle on the network.
文摘Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.
文摘As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could have devastating effects on the operations and reputation of these companies. Preventing such cyberattacks is crucial. Especially, with the significance of the Egyptian oil and gas downstream sector to the local economy and the fact that many of these connected systems are sometimes managed remotely. This paper examines the value of the ISO 27001 standard in mitigating the effect of cyber threat and seeks to inspire decision-makers to the importance of the proactive measures to strengthen their organization’s cybersecurity posture and protect information critical assets. The study stresses the importance of improving the local educational system to bridge the gap between supply and demand for cybersecurity specialists by implementing a structured approach that emphasizes behavior modification to get a high return on investment in cybersecurity awareness.
文摘In the Report of the 19 th National Congress of the Communist Party of China,it stated that we must put the ecological safety and green development in the first place.To achieve rural revitalization,ecological livability is the most important factor.Taking Luquan Yi and Miao Autonomous County(national level poor county)in Jinsha River valley of Yunnan Province as an example,using DPSIR(drivers,pressures,states,impacts,responses)model,this paper established an evaluation indicator system.Besides,using the entropy method,it determined the indicator weight.In addition,it evaluated the land ecological security of Luquan County since the implementation of targeted poverty alleviation policy(2013-2017)using multi-factor comprehensive evaluation method.This study shows that Luquan County has improved its ecological security in the past five years.The ecological status has gone through four stages,from sensitive state to severe state to critical safety to excellent ecology,and the value of the comprehensive index of land ecological security shows a rising trend.Through analyzing the ecological security value of each criterion hierarchy,it obtained the main factors affecting the ecological security of Luquan County.On this basis,it came up with feasible measures and recommendations for studying the ecological security of land in the region,so as to guide the rational use of land and sustainable economic development,provide a reference for the implementation of rural revitalization strategies,and promote the construction of regional ecological civilization.
文摘As the pioneer in the intelligent construction technologies(ICT)of transportation infrastructure,intelligent compaction(IC)has been applied in the infrastructure construction of various countries.It is currently the technology that best reflects the intelligence of engineering construction.This article overviews the latest developments and trends in IC.Firstly,the basic meaning of ICT is defined based on the essential characteristics of intelligent construction of transportation infrastructure,“perception,analysis,decision-making,execution”(PADE).The concept of intelligent compaction technology classification is also introduced.The PADE requirements that intelligent compaction should meet are proposed.Secondly,according to the sequence of“perception,analysis,decision-making,execution,”the workflow and key technologies of intelligent compaction are analyzed,and the mechanism of using the response of the roller to solve the modulus is given and verified.On this basis,The IC feasibility test methods,including compaction degree,compaction stability,and compaction uniformity,are briefly described.The implementation scheme of feedback control is given.Then,the use of artificial neural networks(ANN),hybrid expert systems,and reinforcement learning in intelligent compaction are briefly introduced.Finally,several extended applications of intelligent compaction are expounded,including the development ideas of intelligent road rollers and the role of intelligent compaction in virtual construction,the layer-specific mechanical parameters of fillers,etc.
文摘In order to stabilize the operation of innovation and entrepreneurship education and improve the graduate employment ability of sports training professionals,this paper,based on the literature,work experience and actual environment background,promotes the development and employment of sports training professionals in sports colleges and universities.